I explicitly consent to the collection and processing of my personal data, as inserted in the registration form above, by Kaspersky Lab Z.A.O., HQ, Moscow to contact me and provide me with information on Kaspersky Lab’s products and services including personalized promotional offers and premium assets like white papers, webcasts, videos, events and other marketing materials and related offers as per Kaspersky Lab's Privacy Policy.

I explicitly consent to the collection and processing of my personal data, as inserted in the registration form above, by Kaspersky Lab Z.A.O., HQ, Moscow to contact me and provide me with information on Kaspersky Lab’s products and services including personalized promotional offers and premium assets like white papers, webcasts, videos, events and other marketing materials and related offers as per Kaspersky Lab's Privacy Policy.

REQUEST CONSULTATION

Please fill in the fields below:

I explicitly consent to the collection and processing of my personal data, as inserted in the registration form above, by Kaspersky Lab Z.A.O., HQ, Moscow to contact me and provide me with information on Kaspersky Lab’s products and services including personalized promotional offers and premium assets like white papers, webcasts, videos, events and other marketing materials and related offers as per Kaspersky Lab's Privacy Policy.

Заказать расследование

Заполните регистрационную форму, и наши специалисты свяжутся с вами.

I hereby authorize Kaspersky Lab to collect and use the personal data I entered into this registration form to provide me with information about Kaspersky Lab’s products and services, including customized promotional and supplementary materials such as expert reports, webcasts, videos, event reports, and other marketing information, as well as associated customized advertisements as per Kaspersky Lab’s confidentiality policy.

This is Kaspersky Lab’s most comprehensive business security solution – delivering rigorous protection for your corporate IT network. As well as security for desktops, laptops & file servers – plus data encryption, endpoint control tools & mobile security – it includes special protection technologies for mail servers, collaboration servers and traffic flowing through Web gateways. In addition, extended systems management tools automate a wide range of administration tasks – to save you time and resources.

Delivering multi-layer protection – for workstations and more
Our powerful combination of signature-based, heuristic, behavioral and cloud-assisted technologies delivers multi-layer defenses for any combination of Windows, Mac & Linux workstations. In addition, Application Control, Device Control and Web Control tools complement our protection technologies – helping you to manage applications, block and / or control the use of removable devices and apply safe Web access policies. In addition, you get protection for Windows & Linux file servers – to secure them against known, unknown and advanced threats.

Automatically detecting vulnerabilities & distributing patches
Unpatched vulnerabilities – within operating systems & applications – are frequently used as entry points for attacking businesses. Kaspersky TOTAL Security for Business includes automatic vulnerability scanning and automatic patch distribution – to identify known vulnerabilities on your network and apply patches more rapidly.

Guarding against loss of sensitive data
Powerful data encryption helps you to ensure important files, folders, disks and removable devices are encrypted. Then if a laptop or mobile device is lost or stolen, it needn’t lead to the leakage of sensitive data. With the data encrypted into an unreadable form, your business is less likely to suffer the embarrassment and costs associated with data security breaches. Although some encryption products can be complex to set up and use, our data encryption is easy to configure and can be managed from the same management console used to control all of our endpoint security technologies.
In addition, content-aware Data Loss Prevention options – for collaboration and mail security – help to protect confidential information and boost compliance… by preventing common methods of data leakage.

Securing mobile devices
By combining rigorous mobile security technologies and flexible Mobile Device Management (MDM) & Mobile Application Management (MAM) capabilities, Kaspersky TOTAL Security for Business helps you to protect smartphones & tablets – and the corporate systems and data that they access. Compatible with the most popular mobile platforms, our security and management technologies defend both corporate-issued and BYOD mobiles against malware, unauthorized access – including protection for lost / stolen devices – and more.

Cutting complexity from IT management
Managing a complex IT environment doesn’t have to be a complex task. With a broad array of systems management functionality, Kaspersky TOTAL Security for Business reduces the complexity of managing both security and systems. By automating key security and administration tasks, delivering improved visibility and providing a single management console, we help you to free up time for other mission-critical projects.

Securing your web traffic
With security technologies that protect web traffic flowing through most popular, Windows-based or Linux-based Web gateways, Kaspersky TOTAL Security for Business helps to ensure your users can access the Internet without falling prey to Web-based threats.

Enabling secure collaboration
Our security for SharePoint platforms includes anti-malware, content filtering and file filtering – to help your business enforce its collaboration policies and prevent inappropriate content being stored on your corporate network. Content-aware Data Loss Prevention is available as an extra option.

Centralizing systems management & security
Kaspersky Security Center – our highly integrated management console – gives you centralized control over all Kaspersky Lab endpoint security technologies. In addition, because Kaspersky TOTAL Security for Business supports two of the most popular security information and event management (SIEM) products – HP ArcSight and IBM QRadar – enterprise-level businesses can benefit from integrated monitoring of complex IT environments.

Updating security more efficiently

Because cybercriminals are continually launching new and more complex malware, we deliver database updates on a much more frequent basis than many other security vendors. In addition, we use multiple advanced security technologies to ensure we deliver greatly improved detection rates – while also cutting the size of updates… so more of your communications bandwidth is available for other tasks.

Protecting against unknown and advanced threats

When a new malware item is unleashed on the world, there’s a period of high risk. To deliver zero-hour protection against these threats, Kaspersky Lab technologies and threat intelligence continually evolve to ensure your business is protected from even the most sophisticated, new threats.

Detecting suspicious behavior

Whenever an application launches on your corporate network, our System Watcher module monitors the application’s behavior. If suspicious behavior is detected, System Watcher automatically blocks the application. In addition – because System Watcher keeps a dynamic log of the operating system, registry and more – it automatically rolls back malicious actions that the malware implemented before it was blocked.

Protecting against exploits

Our innovative Automatic Exploit Prevention (AEP) technology helps to ensure malware can’t exploit vulnerabilities within the operating systems or applications that are running on your network. AEP specifically monitors the most frequently targeted applications – including Adobe Reader, Internet Explorer, Microsoft Office, Java and many more – to deliver an extra layer of security monitoring and protection against unknown threats.

Controlling applications and connectivity

For some applications – even though the applications may not be classed as malicious – their activities may be regarded as high-risk. In many cases, it’s advisable that these activities are restricted. Our Host-Based Intrusion Prevention System (HIPS) restricts activities within the endpoint, according to the ‘trust level’ that has been assigned to the application. HIPS works together with our application-level Personal Firewall – which restricts network activity.

Blocking network attacks

Using the power of the cloud – for even better security

With millions of users letting the cloud-based Kaspersky Security Network (KSN) receive data about suspicious behavior on their computers, your business can benefit from improved protection against the latest malware. This real-time flow of data ensures customers can benefit from a rapid response to new attacks – and it helps to minimize the incidence of ‘false positives’.

Ensuring reliable protection

If one of your file servers develops a fault, our security technologies will automatically re-launch when the file server restarts.

Boosting manageability

Every minute you have to spend on administration and generating reports, is time you could be devoting to strategically important activities. That’s why we provide a centralized console that lets you manage security on all your endpoints – file servers, workstations and mobile devices – and makes it easy to generate detailed reports.

Eliminating known vulnerabilities

Our technologies scan your entire network – to identify vulnerabilities that result from unpatched applications or operating systems. Detected vulnerabilities can be automatically prioritized – and then patches and updates can be automatically distributed. Because we distribute new patches more rapidly than many other patching solutions, we help you to eliminate vulnerabilities within a shorter period.

Managing your hardware & software assets

All devices and software on your network are automatically discovered and recorded in a hardware inventory and a software inventory. The hardware inventory includes detailed information about each device and the software inventory helps you to control software usage and block unauthorized applications.
Even guest devices that appear on your network can be automatically discovered – and provided with access privileges, without compromising the security of your corporate systems and data.

Optimizing the distribution of applications

You can deploy software at your command or schedule it for after office hours. For some installers, you can specify additional parameters in order to customize the software package that is installed. The use of secure, remote connections to any desktop or client computer helps you to resolve issues rapidly – and an authorization mechanism prevents unauthorized remote access. For traceability, all activities during a remote access session are logged.

Automating & optimizing OS deployment

Our technologies automate and centralize the creation, storage and cloning of secured system images. Images are held in a special inventory – ready to be accessed during deployment. Client workstation image deployment can be made with either PXE servers (Preboot eXecution Environment) – that have been previously used on the network – or using our own features. The use of Wake-on-LAN signals lets you automatically distribute the images after office hours. UEFI support is also included.

Reducing traffic – remote distribution

If you need to distribute software or patches to a remote office, one local workstation can act as the update agent for the entire remote office – to help reduce traffic levels on your network.

Integration with SIEM systems

Because security information and event management (SIEM) systems can play a vital role in helping enterprise-level businesses to gain real-time monitoring, we’ve included integration with two of the most popular SIEM products – HP ArcSight and IBM QRadar.

Strong encryption

By using an AES encryption algorithm that has 256 bits of key length and is NIST approved (#2980), we deliver strong encryption for your confidential information. If files or systems are lost or stolen, unauthorized users will not be able to access your encrypted data. Our encryption has also been designed to be FIPS 140-2 compliant (validation pending).

Integrated – for improved manageability

Although many vendors’ encryption products are not delivered as part of an integrated IT security solution, our encryption technologies are one component within a unified codebase that has all been developed by our in-house team. This makes it easier for you to apply encryption settings as part of the same policies that cover your anti-malware defenses, endpoint controls and other endpoint security technologies.

Full Disk Encryption and File-Level Encryption

For encryption that's 'close to the hardware' – and to make it easy for you to run an 'encrypt everything at once' strategy – Full Disk Encryption (FDE) operates on the physical sectors of the disk. File-Level Encryption (FLE) helps you to enable secure sharing of data across your network. For additional security – when a file is encrypted – the original, unencrypted file can be wiped from the hard drive.

Encryption of removable media

To protect data that also needs to be transferred on removable devices, Removable Media Encryption can perform Full Disk Encryption and File-Level Encryption.

‘Portable mode’ encryption

If you need to transfer sensitive data via email, the Internet or a removable device, you can easily set up password-protected, encrypted, self-extracting packages of files and folders. A special 'portable mode', for File-Level Encryption on removable media, helps enable the secure transfer of data – even onto computers that are not running Kaspersky Endpoint Security for Windows.

Simplified sign-on and smartcard / token support

When a user switches on their PC and enters their username and password, our Single Sign-On feature will give the user immediate access to the encrypted data on their PC's hard drive. This helps to ensure the encryption & decryption processes are virtually transparent to the user – and that helps to boost efficiency and productivity. Two-factor authentication – via smartcards and tokens – is also supported.

Support for Intel AES-NI and more

By supporting Intel AES-NI, we enable more rapid encryption and decryption of data – for many Intel processor-based and AMD processor-based systems*. Our Full Disk Encryption technology also supports UEFI-based platforms. There’s also support for non-QWERTY keyboards.

Robust mobile security

By combining the industry’s most advanced technologies, we defend against the latest mobile threats. Anti-phishing protects against websites that try to steal information or identity details – and anti-spam helps to filter out unwanted calls & texts.
Flexible control tools let you block the launch of unauthorized applications and block access to dangerous websites. Rooting and jailbreaking incidents are automatically detected – and the devices are blocked.

Separating corporate and personal data

Our ‘app wrapping’ technology lets you set up special containers on each device. Corporate applications are stored in the containers – totally separated from the user’s personal data. You can enforce encryption for all containerized data and prevent data from being copied and pasted outside the container – plus you can request additional user authorization before containerized applications are allowed to launch.
If an employee leaves your business, the remotely operated Selective Wipe feature lets you delete the corporate container – without deleting the device owner’s personal data and settings.

Supporting common MDM platforms

With improved mobile device management (MDM) capabilities, it’s easy to apply group or individual MDM policies to Microsoft Exchange ActiveSync and iOS MDM devices – through a single interface. Support for Samsung KNOX lets you manage various settings for Samsung devices.

Locking, wiping and locating missing devices

Remotely operated security features help to protect corporate data on missing devices. Administrators and users can lock the device, delete corporate data and find the device’s location. If a thief changes the SIM card, our SIM Watch feature sends you the new phone number – so you can still run the anti-theft features. Support for Google Cloud Messaging (GCM) helps ensure Android phones receive anti-theft commands rapidly.

Self-Service Portal

Our special Self-Service Portal makes it easy to enable personal mobile devices onto the corporate network. In addition, the portal gives users remote access to key anti-theft features – so users can rapidly respond to the loss of a device and reduce the risk of data loss, without adding to the load on administrators.

Easing the burden on IT administrators

A single centralized console lets you manage mobile devices – and their security – and makes it easy to apply consistent policies across different mobile platforms. In addition, our Web Console lets you manage mobile devices and their security – plus the security of other endpoints – from anywhere you can get online.

*Some features are not available for some of the supported mobile platforms.

Dynamic Whitelisting – to complement security

Our Application Control is the industry’s most comprehensive implementation. We’re the only security vendor that has invested in establishing its own Whitelisting Lab that checks applications for security risks. Our database of whitelisted applications includes over 1.3 billion unique files – and it’s growing by a further 1 million files per day. Application Control and Dynamic Whitelisting makes it easier for you to run a Default Deny policy that blocks all applications, unless they’re on your whitelist.
If you’re looking to introduce or update a Default Deny policy, our new test mode lets you set up the policy in a test environment – so you can check your policy is correctly configured, before you ‘go live’.

Preventing the connection of unauthorized devices

Device Control tools make it easy to manage which devices are allowed to access your corporate IT network. You can set up controls that are based on the time of day, geographic location or the type of device. You can also align the controls with Active Directory – for granular administration and policy assignment. Administrators can also use masks in the creation of Device Control rules – so multiple devices can easily be whitelisted for use.

Monitoring and controlling Internet access

Our Web Control tools let you set up Internet access policies and monitor Internet usage. It’s easy to prohibit, limit, allow or audit your users’ activities on individual websites or categories of sites, such as games websites, social networks or gambling sites. Geographic and time-of-day controls may be aligned with Active Directory – to help in administration and setting policies.

Securing multiple platforms

With support for a wide range of mail servers – including Microsoft Exchange, IBM Lotus Notes / Domino, Sendmail, qmail, Postfix, Exim and CommuniGate Pro – our mail server security technologies protect mail traffic and groupware servers against malware and spam. Kaspersky TOTAL Security for Business can also be used to set up a dedicated mail gateway.

Filtering out spam

Effective spam filtering can help businesses to boost efficiency and productivity. Our intelligent spam filtering technology helps to prevent the arrival of distracting spam messages in users’ inboxes. It achieves a very low rate of false positives – while reducing traffic on your corporate network.

Managing complexity

Helping to preserve performance

With optimized scanning – plus the option to exclude specific items from a scan – our mail server protection also supports load balancing of server resources. This means you benefit from highly effective protection, without any significant impact on performance.

Boosts Data Protection and Compliance

Our technologies analyze the content of outgoing emails and automatically block messages and attachments that contain confidential corporate data or sensitive information about employees. In addition to scanning for words contained in our pre-installed glossaries – or your administrator’s custom glossary – we also scan for structured data.*

*Data Loss Protection features are only available for Microsoft Exchange Servers and are licensed separately.

Securing traffic

Our security technologies deliver protection for traffic flowing through most popular, Windows-based or Linux-based gateways – automatically removing malicious and potentially hostile programs that appear in HTTP(S), FTP, SMTP and POP3 traffic. With frequent updates, Kaspersky TOTAL Security for Business helps to protect you against known and unknown threats.

Protecting mail

Kaspersky TOTAL Security for Business can protect corporate mail flowing through Microsoft Forefront TMG or Microsoft ISA Server.

Delivering high detection rates

With intelligent, optimized scanning – plus load balancing – Kaspersky TOTAL Security for Business delivers high detection rates, without any significant impact on system performance.

Enhancing manageability

Easy-to-use management tools – together with flexible reporting capabilities – help to ensure you get improved visibility and improved control of your security.

Protecting SharePoint environments

Easy-to-use security, file filtering and content filtering let you centrally manage the protection of an entire Microsoft SharePoint server farm – from a single console. Our protection technologies have very little impact on the performance of your systems.

Helping to optimize storage

To help you achieve more efficient use of your data storage, our file filtering technologies aid you in eliminating the storage of unnecessary files – and make it easier to enforce your document storage policies. You can create lists of prohibited file names and extensions – and we also provide preset file type profiles that let you rapidly implement policies for music, video, executable files and more.
By analyzing real file formats – regardless of the file extension name – our technology ensures security policies cannot be violated by files that avoid the use of a prohibited file extension.

Providing flexible content filtering

By checking all documents against lists of prohibited content – including explicit words / phrases and the use of offensive language – content filtering helps you to control and assign internal collaboration policies. With pre-installed dictionaries / categories – and the ability to create your own list of prohibited words and phrases – it’s easy to configure content filtering that’s tailored to your requirements.

Giving you real-time status information

Our dashboard display gives you at-a-glance access to real-time data – including IT security status, database version and license status for all protected servers. In addition, Kaspersky TOTAL Security for Business makes it easy to generate reports on events and security status.

Boosts Data Protection and Compliance

Kaspersky TOTAL Security for Business analyzes the content of documents stored within Microsoft SharePoint Server – and automatically registers and blocks any that contain identified confidential corporate data or sensitive information. In addition to scanning for words contained in its pre-installed glossaries – or your administrator’s custom glossary – it also scans for structured data.*

Letting you control all functions from one console*

Kaspersky TOTAL Security for Business includes Kaspersky Security Center – a single unified management console that gives you visibility and control of all of the Kaspersky Lab endpoint security technologies that you’re running. Kaspersky Security Center lets you manage security for your mobile devices, laptops, desktops, file servers, virtual machines and more – with the convenience of a ‘single pane of glass’ console.

Assigning different responsibilities to different administrators

Role-Based Access Control helps you to divide security management & systems management responsibilities between multiple administrators. For example, you may want one administrator to manage endpoint security, endpoint controls and mobile security, while another administrator takes care of data encryption and all systems management functions. The Kaspersky Security Center console can easily be customized so that each administrator only has access to the tools and information that are relevant to their responsibilities.

Delivering a higher level of integration

Because tightly-integrated code results in products that deliver improved security, performance and manageability, all of our endpoint technologies have been developed by our own in-house team. All of our endpoint protection functionality is contained in the same codebase – so there are no incompatibility issues for you to deal with. Instead, you benefit from seamlessly integrated security technologies that do more to protect your IT environment – while centralized management saves you time.

*Kaspersky Security Center enables centralized control of all endpoint security technologies within Kaspersky TOTAL Security for Business. Kaspersky Security Center is not used to manage Kaspersky Security for Internet Gateway, Kaspersky Security for Mail Server and Kaspersky Security for Collaboration.

The following applications are all included within Kaspersky TOTAL Security for Business: